Vulnerability and information security investment: An empirical analysis of e-local government in Japan

Journal of Accounting and Public Policy - Tập 24 - Trang 37-59 - 2005
Hideyuki Tanaka1, Kanta Matsuura2, Osamu Sudoh1
1Graduate School of Interdisciplinary Informatics, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033, Japan
2Institute of Industrial Science, The University of Tokyo, 4-6-1, Komaba, Meguro-ku, Tokyo 153-8505, Japan

Tài liệu tham khảo

Anderson, R.J., 2001. Why information security is hard: An economic perspective. In: 17th Annual Computer Security Applications Conference Applegate, L.M., Montealegre, R., 1991. Eastman Kodak Co.: Managing Information Systems through Strategic Alliances. Case 9-192-030, Harvard Business School Beattie, S. et al., 2002. Timing the application of security patches for optimal uptime. In: Proceedings of LISA 2002, 3–8 November, Philadelphia, pp. 233–242 Brown, 2003, Does IT matter?, Harvard Business Review, 81, 109 CIO Council, 1999. Federal Enterprise Architecture Framework ver. 1.1 Commonwealth of Australia, 2003. Interoperability Technical Framework for the Australian Government Davenport, 1993 Davenport, 1990, The new industrial engineering: Information technology and business process redesign, Sloan Management Review, 31, 11 Drucker, 2002, They’re not employees, they’re people, Harvard Business Review, 80, 70 Forehand, 2003, Evolution of the outsourcing, Diamond Harvard Business Review, 28, 170 Gordon, 2002, The economics of information security, ACM Transactions on Information and System Security, 5, 438, 10.1145/581271.581274 Gordon, 2003, Sharing information on computer system security: An economic analysis, Journal of Accounting and Public Policy, 461, 10.1016/j.jaccpubpol.2003.09.001 Grossman, 2002, Integration versus outsourcing in industry equilibrium, The Quarterly Journal of Economics, 117, 85, 10.1162/003355302753399454 Hammer, 1990, Reengineering work: Don’t automate, obliterate, Harvard Business Review, 68, 104 Hammer, 2001 Hammer, 1999, How process enterprise really work, Harvard Business Review, 77, 108 Höne, 2002, Information security policy: What do international information security standards say?, Computers and Security, 21, 402, 10.1016/S0167-4048(02)00504-7 International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), 2000. Information Technology: Code of Practice for Information Security Management. ISO/IEC 17799, Geneva Japan Information Processing Development Corporation (JPDEC), 1992. JIPDEC Risk Analysis Method. JIPDEC, Tokyo Japan Policy Agency (JPA) of the Japanese Government, 2003. Actual Condition Survey of Unauthorized Access Measurement KBSt of German Federal Ministry of Interior, 2003. Standard and Architectures for e-Government Applications Ver.1.1 Kunreuther, 2003, Interdependent security, The Journal of Risk and Uncertainty, 26, 231, 10.1023/A:1024119208153 Matsuura, K., 2003. Information security and economics in computer networks: An interdisciplinary survey and a proposal of integrated optimization of investment. In: The 9th International Conference of Computing in Economics and Finance (CEF 2003) Mercuri, 2003, Analyzing security costs, Communications of the ACM, 46, 15, 10.1145/777313.777327 Ministry of Economy Trade and Industry (METI) of the Japanese Government, 2003. Guideline for formulating Enterprise Architecture Ministry of Science, Technology and Innovation (MSTI) of the Danish Government, 2003. White Paper on Enterprise Architecture National Bureau of Standard (NBS), 1979. Guideline for Automatic Data Processing Risk Analysis. FIPS PUB 65 National Institute of Standards and Technology (NIST), 1995. An Introduction to Computer Security. NIST Handbook, Special Publication, pp. 800–812 NIST, 2001. Risk Management Guide for Information Technology Systems. NIST Handbook, Special Publication, pp. 800–830 Simon, 1996 Stevens, B., 2004. The emerging security economy: An introduction. In: OECD, The Security Economy, pp. 7–16 Soo Hoo, 2001, Tangible ROI through secure software engineering, Secure Business Quarterly, 1, 1 Tanaka, H., Matsuura K., 2003. Institutional design of information security management. In: Network Security Forum 2003, 22–24 October, Tokyo (in Japanese) Varian, H.R., 2002, System reliability and free riding. In: Proceedings of the First Workshop on Economics and Information Security, 16–17 May, University of California, Berkley Wei, H., Frinke, D., Carter, O., Ritter, C., 2001. Cost-benefit analysis for network intrusion detection systems. In: Proceeding of CSI 28th Annual Computer Security Conference, 29–31 October, Washington, DC